CN104331655A - ChinaNet information safety protection system and protection method - Google Patents

ChinaNet information safety protection system and protection method Download PDF

Info

Publication number
CN104331655A
CN104331655A CN201410588159.XA CN201410588159A CN104331655A CN 104331655 A CN104331655 A CN 104331655A CN 201410588159 A CN201410588159 A CN 201410588159A CN 104331655 A CN104331655 A CN 104331655A
Authority
CN
China
Prior art keywords
circuit
chip
ssx0912
safety
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410588159.XA
Other languages
Chinese (zh)
Inventor
李晓林
赵梓绢
冯煜
郝江
赵睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANXI NETCHINA INFORMATION INDUSTRY Co Ltd
Original Assignee
SHANXI NETCHINA INFORMATION INDUSTRY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANXI NETCHINA INFORMATION INDUSTRY Co Ltd filed Critical SHANXI NETCHINA INFORMATION INDUSTRY Co Ltd
Priority to CN201410588159.XA priority Critical patent/CN104331655A/en
Publication of CN104331655A publication Critical patent/CN104331655A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention provides a ChinaNet information safety protection system and a ChinaNet information safety protection method. The ChinaNet information safety protection system comprises a safety chip SSX0912 circuit, wherein the safety chip SSX0912 circuit U2 is connected with a fingerprint chip circuit U7 and a storage chip circuit U4; the safety chip SSX0912 circuit U2 is connected with a USB (Universal Serial Bus) interface; a power supply connection interface U5 and the safety chip SSX0912 circuit U2 are connected with a power source U3. The protection system and the protection method are used for the safe storage and safe transmission of information.

Description

Middle net Information Security Defending System and means of defence
Technical field:
The present invention relates to net Information Security Defending System and means of defence in one.
Background technology:
Information Security Defending System has fingerprint identification function, and fingerprint identification technology is an application technology comparatively ripe in living things feature recognition field.For a long time, fingerprint identification technology is mainly used in criminal investigation and judicial expertise field, not understand by most people.The develop rapidly of computing machine and the information processing technology, for this time-honored application technology has opened up more wide market, fingerprint identification technology and Related product are applied to commercial market more and more.Fingerprint identification technology is current most convenient, reliable, non-invasive and low-cost biological identification technology solution, and the application for significant market has very large potentiality.
The fingerprint recognition of existing equipment and matching effect can not reach perfect condition, and the performance of fingerprint matching algorithm depends primarily on the reliability of the number of extracted unique point, position and mutual relationship.Although have a lot of fingerprint matching algorithm to combine local feature and global characteristics at present, the effect that can reach is not very desirable.And the born fingerprint characteristic of some people is less, be difficult to collect image, surrounding environment, finger, humiture, cleanliness and skin wound is de-simultaneously all can affect fingerprint recognition effect.
Summary of the invention:
The object of this invention is to provide a kind of can solve data safe storage and safe transmission in net Information Security Defending System and means of defence.
Above-mentioned object is realized by following technical scheme:
Net Information Security Defending System in one, its composition comprises: safety chip SSX0912 circuit, described safety chip SSX0912 circuit U 2 connects fingerprint chip circuit U7, storage chip circuit U 4, described safety chip SSX0912 circuit U 2 connects USB interface, described electric power connection interface circuit U 5, described safety chip SSX0912 circuit U 2 connects power supply U3.
Described middle net Information Security Defending System, described safety chip SSX0912 circuit is the USB communication of safety governor, the data communication that high speed USB 2.0 Interface realization of use safety controller chip self and PC hold; Safety chip SSX0912 circuit comprises controller U2, and described controller U2 connecting interface device U1, described controller U2 has Pin34 and Pin35.
Described middle net Information Security Defending System, described interface circuit U5 is that the power supply that electric power management circuit uses LDO chip to realize PC end USB 5V power supply and equipment is changed; Described interface circuit U5 comprises U5 chip, and described U5 chip connects clock circuit, and described clock circuit provides system clock by the crystal of 12M and the safety governor that is combined as of resonant circuit; Described clock circuit comprises JZ1, R3, C4, C5.
Described middle net Information Security Defending System, described safety chip SSX0912 circuit U 2 connects reset circuit, and described reset circuit realizes the reset and protection of whole circuit by voltage checking chip, and described reset circuit comprises U3 device.
Described middle net Information Security Defending System, described storage chip circuit U 4 is data storage circuitry, and use the jumbo NAND FLASH of MLC to realize data and store, described data storage circuitry comprises U4 device.
Described middle net Information Security Defending System, described fingerprint chip circuit U7 is fingerprint recognition circuit is the data acquisition and the Information Authentication process that are realized living body finger print by fingerprint sensor and the cooperation of its peripheral circuit, completes the function of fingerprint recognition; Realized by U7 sensor.
The means of defence of described middle net Information Security Defending System, utilizes information security chip SSX0912 directly mount with control Nand Flash and be connected usb host, achieves the safety encipher equipment of fast mode communication; Fast mode communication apparatus is divided into general area and place of safety, and wherein general area uses as common U disk, provides access when user does not log in; Place of safety presents after the user logs, and Flash storage is data encryption; By mounting fingerprint sensor, SSX0912 achieves bio-identification identity authentication function; User is logged in and is realized by finger print identifying; The matching operation of fingerprint carries out in SSX0912 safety chip inside.
The means of defence of described middle net Information Security Defending System, source file data division adopts SM1 cryptographic algorithm; SM1 cryptographic algorithm session key is produced by the physical noise source real random number generator of SSX0912 safety chip, one-time pad; Encrypt file is available to specifies addressee; Digital envelope agreement adopts addressee SM2 asymmetric cryptographic algorithm PKI to SM1 session key; The addressee specified disassembles digital envelope, to file decryption; Encrypt file uses sender namely to encrypt the SM2 cryptographic algorithm digital signature of people.
Beneficial effect:
1. the present invention be directed to security fields and the safety product designed, be specifically related to the functions such as authentication, safe storage, data encryption, file pulverizing, it realizes the function of safety encipher by fingerprint identification technology.
2. middle net Information Security Defending System of the present invention effectively can solve user by the mode that fingerprint carries out certification cannot the problem of normal running because forgetting Password password.
3. safety governor of the present invention can be communicated with PC main frame by its hi-speed USB interface; Data storage can realize jumbo data and preserve; Fingerprint recognition can realize the registration of living body finger print, identification and verification; Coordinated by the code of safety governor inside, movable storage device can realize the functions such as finger print information checking and corresponding data encryption storage, thus realizes the high safe storage of sensitive data.
4. the present invention has the identification means of secure storage areas employing biometrics identification technology (fingerprint) as user of identity authentication function; The information of safe storage section adopts SM1 symmetric cryptographic algorithm cryptographic storage.File encryption is served.
5. encrypt file of the present invention adopts electronic envelope structure, adopts SM1 algorithm and SM2 algorithm as secret-key algorithm and public key algorithm respectively; Adopt SM2 algorithm to file digital signature.
6. the present invention adopts bio-identification and encription algorithms approved by the State Password Administration Committee Office technology, key is generated according to individual fingerprint, in order to encrypt the data on the memory devices such as PC hard disk, common U disk, portable hard drive, and realize the functions such as visiting-card management, file pulverizing and daily record examination & verification, whole ciphering process is all linked with one another, defend comprehensively, do not stay dead angle, not to cracking, any opportunity of the person of stealing secret information.
7. the degree of depth of the close chip of biometrics identification technology of the present invention and state merges, and by mounting fingerprint sensor, makes safety chip achieve bio-identification identity authentication function.The fingerprint identification equipment of a lot of routine, is be built in fingerprint capturer by fingerprint comparison algorithm, completes the comparison to finger print information by fingerprint capturer.As comparison success, clearance subsequent operation.This mode is very easily subject to " forging successful instruction " or the attack of " walking around fingerprint comparison ", causes the result that certification is performed practically no function.And middle net Information Security Defending System authenticated connection and conventional fingerprint equipment unlike, the matching algorithm of fingerprint carries out in SSX0912 safety chip inside, even if orcible entry equipment, bypassing authentication mechanism, has higher security.
8. dynamic self-adapting fingerprint correction algorithm technology of the present invention and be in routine use with the combination of state close chip, the phenomenons such as temperature, humidity, seasonal variations may make fingerprint cast off a skin, the collection effect of fingerprint is impacted, the dynamic self-adapting fingerprint correction correlation technique that this product adopts, is successfully also built in this algorithm in crypto chip; This technology can on the basis of abundant comparison fingerprint feature point, and repeatedly finger print information storehouse is revised in fine setting, adapts to the subtle change of user fingerprints, promotes and identifies accuracy.
9. the Security Data Transmission technology of appointment addressee of the present invention, specifies the Data Encryption Transmission technology of addressee; Utilize the combination of block cipher and asymmetric cryptographic algorithm, create the data encryption system of following features; First directional data encryption, the addressee only having authority deciphers by held terminal encryption machine.Second slitless connection operation system, " form, document, annex, data-base content " that operation system is produced etc. are already encrypted at the beginning of generation, ensure the security of data.The ciphertext of the 3rd data is through encipherer's digital signature, and addressee can verify its digital signature.4th by means of the process of software, and file encryption also has following features, and the 5th does not limit file layout, supports various file layout and extension name.After encryption, filename can increase a star-like figure.6th supports without addressee's (encipherer uses by oneself) and multiple addressee; 7th supports that the group of the some people's compositions sharing a certain private key is as addressee; Addressee is changed by former encipherer after 8th supporting document encryption; 9th supports to repeat encryption (multiple addressee's transmission).
10. the disaster-tolerant backup technology of password product of the present invention;
A high strength encrypting security classes product, while protection user data, also likely faces due to the factor such as device losses or device damage, causes validated user cannot the puzzlement of data decryption.The encryption mechanism that the equipment PKI of devising is standby mutually, make user that the PKI of alternate device can be specified to be the acquiescence business card of main equipment, main equipment automatically can add the business card of alternate device while enciphered data, because standby equipment all needs the identity information of authenticated mutually, thus making middle net Information Security Defending System under the prerequisite not reducing Cipher Strength and device security, perfect solution is due to the document reduction problem after device losses or damage.
11. the present invention be China first by commercial encryption products model based on commercial cipher and living things feature recognition authentication techniques data security class memory device.
Accompanying drawing illustrates:
Accompanying drawing 1 is the system chart of this product.
Accompanying drawing 2 is the interface circuit figure in accompanying drawing 1.
Accompanying drawing 3 is the safety chip SSX0912 circuit diagrams in accompanying drawing 1.
Accompanying drawing 4 is the storage chip circuit diagrams in accompanying drawing 1.
Accompanying drawing 5 is the fingerprint chip circuit figure in accompanying drawing 1.
Embodiment:
Embodiment 1:
Net Information Security Defending System in one, its composition comprises: safety chip SSX0912 circuit 1, it is characterized in that: described safety chip SSX0912 circuit (U2) connects fingerprint chip circuit (U7) 2, storage chip circuit (U4) 3, described safety chip SSX0912 circuit U 2 connects USB interface (U1) 4, described electric power connection interface circuit (U5) 5, described safety chip SSX0912 circuit U 2 connects power supply (U3) 6.
Embodiment 2:
Middle net Information Security Defending System described in embodiment 1, described safety chip SSX0912 circuit is the USB communication of safety governor, the data communication that high speed USB 2.0 Interface realization of use safety controller chip self and PC hold; Safety chip SSX0912 circuit comprises controller U2, and described controller U2 connecting interface device U1, described controller U2 has Pin34 and Pin35.
Embodiment 3:
Middle net Information Security Defending System described in embodiment 1, described interface circuit U5 is that the power supply that electric power management circuit uses LDO chip to realize PC end USB 5V power supply and equipment is changed; Described interface circuit U5 comprises U5 chip, and described U5 chip connects clock circuit, and described clock circuit provides system clock by the crystal of 12M and the safety governor that is combined as of resonant circuit; Described clock circuit comprises JZ1, R3, C4, C5.
Embodiment 4:
Middle net Information Security Defending System described in embodiment 1, described safety chip SSX0912 circuit U 2 connects reset circuit, and described reset circuit realizes the reset and protection of whole circuit by voltage checking chip, and described reset circuit comprises U3 device.
Embodiment 5:
Middle net Information Security Defending System described in embodiment 1, described storage chip circuit U 4 is data storage circuitry, and use the jumbo NAND FLASH of MLC to realize data and store, described data storage circuitry comprises U4 device.
Embodiment 6:
Middle net Information Security Defending System described in embodiment 1, described fingerprint chip circuit U7 is fingerprint recognition circuit is the data acquisition and the Information Authentication process that are realized living body finger print by fingerprint sensor and the cooperation of its peripheral circuit, completes the function of fingerprint recognition; Realized by U7 sensor.
Embodiment 7:
The means of defence of the middle net Information Security Defending System described in embodiment 1, utilizes information security chip SSX0912 directly mount with control Nand Flash and be connected usb host, achieves the safety encipher equipment of fast mode communication; Fast mode communication apparatus is divided into general area and place of safety, and wherein general area uses as common U disk, provides access when user does not log in; Place of safety presents after the user logs, and Flash storage is data encryption; By mounting fingerprint sensor, SSX0912 achieves bio-identification identity authentication function; User is logged in and is realized by finger print identifying; The matching operation of fingerprint carries out in SSX0912 safety chip inside.
Embodiment 8:
The means of defence of the middle net Information Security Defending System described in embodiment 7, source file data division adopts SM1 cryptographic algorithm; SM1 cryptographic algorithm session key is produced by the physical noise source real random number generator of SSX0912 safety chip, one-time pad; Encrypt file is available to specifies addressee; Digital envelope agreement adopts addressee SM2 asymmetric cryptographic algorithm PKI to SM1 session key; The addressee specified disassembles digital envelope, to file decryption; Encrypt file uses sender namely to encrypt the SM2 cryptographic algorithm digital signature of people.
Embodiment 9:
The means of defence of the middle net Information Security Defending System described in above-described embodiment, the equipment end of this product is the finger print safety equipment based on crypto chip.When net Information Security Defending System inserts a PC in handle, after operating system, identify a CD-ROM and memory block.
Before carrying out fingerprint login, it is seen that an ordinary mobile storage, it is as broad as long with the movable storage device bought on the market.It can be used as common memory device to use.
In CD-ROM, an exe file can be seen.The management software of message protection system that Here it is.If have employed automatic operation, or with double mouse click it, just can see the program interface of ejection.
Finger print safety memory block carries out login authentication based on the fingerprint of user.Therefore, before the secure storage areas that use one is new, the fingerprint of necessary registered user.
(1) fingerprint management
In a secure storage areas, 10 pieces of fingerprints can be preserved.
When mouse-click left screen fingerprint management button, just enter fingerprint management interface.
If the middle net Information Security Defending System of the fingerprint that has not yet registered, directly interface can be entered.Otherwise system can eject finger print identifying dialog box, asks finger print identifying.Only have by certification, just can enter interface.
In fingerprint management interface, there is the handle icon of 10 pieces of fingerprints.
Click the empty fingerprint icon had not yet registered, will interpolation fingerprinting operation be entered.Otherwise, click chartered fingerprint, then enter fingerprint deletion action.
According to the prompting of program, interpolation or deletion action can be completed easily.
(2) visiting-card management
In secure storage areas, the business card of some contact persons can be preserved.
One or several contact person can be chosen as addressee, for user carries out file encryption.File after encryption, only has encipherer and addressee to decipher.
Contact person can be personal, also can be a group.Therefore, can: encryption only deciphers for oneself the file (not selecting addressee during encryption) checked; For one or more individual or group's encrypt file, only selectively addressee can decipher;
All right: multi-enciphering: such as
Select an addressee A as final addressee, carry out file encryption.
Then select a transfer people B as addressee, the file of encryption is encrypted again.
When file being given B transfer, B can once decipher.But see not isolog.B gives A file again, is undertaken, in this deciphering, obtaining expressly by A.
When opening file more than needs two people (such as paper), this method is very applicable.Triple or more infill layer can also be carried out.
Relay is encrypted:
Can by more than two people as encipherer, to file multi-enciphering.
Because file has the digital signature of encipherer, relay encryption can represent that multidigit encipherer is responsible for the file submitted to thus.
The effect of business card is exactly:
When encrypting, addressee can be selected from business card;
When deciphering, system can utilize the digital signature of the public key verifications sender carried in business card.
When mouse-click visiting-card management software, visiting-card management interface will be entered.
In visiting-card management interface, can import or delete business card.
(3) file protection
(3.1) file encryption
When clicking file encryption button, file encryption interface will be entered.
One or more file can be pulled into file encryption interface.If the file pulled into is unencryption file, then corresponding operating is encryption; If encrypt file, default operation is deciphering.
After drag and drop, system can point out certification fingerprint.Each encryption all can require certification, to guarantee that I carries out file encryption at use safety system.
If authentication success, prompting is selected addressee by system.As mentioned above, can not addressee be selected, or select one or more addressee.
After selection is determined, system can point out select File storing path.If have selected the same path of source file, then encryption or declassified document can cover source file; If have selected other paths, then the file obtained can be preserved in addition.
Can also be encrypted or declassified document by following approach:
Click encryption or deciphering button, select File in the Open File dialog box ejected.Follow-up operation is the same.
Right mouse button clicks a file, and Choice encryption or deciphering in popup menu while being encrypt file (only click can be with) menu item, subsequent operation is identical.
Double mouse click encrypt file, be decrypted, follow-up operation is identical.
(3.2) file is pulverized
When clicking file and pulverizing button, file will be entered and pulverize interface.
A file icon can be dragged and dropped into file pulverizing and protect interface, to its complete deletion.
System can eject one and confirm prompting frame.
If determined, system can eject the number of times that a dialog box allows selection pulverize.After determining, file will disappear.
(5) system login
If also do not logged in, click system login button, finger print identifying prompting frame can be ejected.
After finger print identifying success, the mobile storage district of system display will switch to secure storage areas.Secret file and information can be preserved wherein.
If logged in, then after clicking this button, confirmation prompting frame can be ejected.If determined, will log off login, and visible mobile storage district comes back to general memory area.
Embodiment 9:
The means of defence of the middle net Information Security Defending System described in above-described embodiment, 1. the Nand flash storage interface that hardware and firmware realize is by the embedded Nand flash storage interface controller of SSX0912-B safety chip, can realize the read-write of external Flash easily.
Advanced ECC error correcting capability, supports 100-bit ECC error correction.
The Nand flash storage of compatible various structure organization, such as different capabilities, different masses size, not same page size, various Plain 26S Proteasome Structure and Function is supported.
Hardware FTL realizes, and the read-write storer making the COS code of security terminal only Nand flash storage be regarded as a standard visits.
2. fingerprint algorithm
Advanced fingerprint algorithm, is equipped with capacitive fingerprint sensor.
First characteristics extraction algorithm, then fingerprint matching.Fingerprint matching technology in sheet, can prevent hardware from cracking completely and enter; Last fingerprint dynamic learning technology, auto modification user points seasonal and gradual physiological change.
3. the SM1/SM2/SM3 cryptographic algorithm of hardware supported is the cryptographic storage at private space; Various cryptographic algorithm needed for file encryption.
4. the SM4 cryptographic algorithm of software simulating is the Cheng Cheng of challenge response message in verification process.Password in command channel and fingerprint template encryption.The generation of the process key that above-mentioned encryption is used.

Claims (8)

1. net Information Security Defending System in a kind, its composition comprises: safety chip SSX0912 circuit, it is characterized in that: described safety chip SSX0912 circuit U 2 connects fingerprint chip circuit U7, storage chip circuit U 4, described safety chip SSX0912 circuit U 2 connects USB interface, described electric power connection interface circuit U 5, described safety chip SSX0912 circuit U 2 connects power supply U3.
2. middle net Information Security Defending System according to claim 1, is characterized in that: described safety chip SSX0912 circuit is the USB communication of safety governor, the data communication that high speed USB 2.0 Interface realization of use safety controller chip self and PC hold; Safety chip SSX0912 circuit comprises controller U2, and described controller U2 connecting interface device U1, described controller U2 has Pin34 and Pin35.
3. middle net Information Security Defending System according to claim 1, is characterized in that: described interface circuit U5 is that the power supply that electric power management circuit uses LDO chip to realize PC end USB 5V power supply and equipment is changed; Described interface circuit U5 comprises U5 chip, and described U5 chip connects clock circuit, and described clock circuit provides system clock by the crystal of 12M and the safety governor that is combined as of resonant circuit; Described clock circuit comprises JZ1, R3, C4, C5.
4. middle net Information Security Defending System according to claim 1; it is characterized in that: described safety chip SSX0912 circuit U 2 connects reset circuit; described reset circuit realizes the reset and protection of whole circuit by voltage checking chip, and described reset circuit comprises U3 device.
5. middle net Information Security Defending System according to claim 1, is characterized in that: described storage chip circuit U 4 is data storage circuitry, and use the jumbo NAND FLASH of MLC to realize data and store, described data storage circuitry comprises U4 device.
6. middle net Information Security Defending System according to claim 1, it is characterized in that: described fingerprint chip circuit U7 is fingerprint recognition circuit is the data acquisition and the Information Authentication process that are realized living body finger print by fingerprint sensor and the cooperation of its peripheral circuit, completes the function of fingerprint recognition; Realized by U7 sensor.
7. the means of defence of middle net Information Security Defending System according to claim 1, is characterized in that: utilize information security chip SSX0912 directly mount with control Nand Flash and be connected usb host, achieve the safety encipher equipment of fast mode communication; Fast mode communication apparatus is divided into general area and place of safety, and wherein general area uses as common U disk, provides access when user does not log in; Place of safety presents after the user logs, and Flash storage is data encryption; By mounting fingerprint sensor, SSX0912 achieves bio-identification identity authentication function; User is logged in and is realized by finger print identifying; The matching operation of fingerprint carries out in SSX0912 safety chip inside.
8. the means of defence of middle net Information Security Defending System according to claim 7, is characterized in that: source file data division adopts SM1 cryptographic algorithm; SM1 cryptographic algorithm session key is produced by the physical noise source real random number generator of SSX0912 safety chip, one-time pad; Encrypt file is available to specifies addressee; Digital envelope agreement adopts addressee SM2 asymmetric cryptographic algorithm PKI to SM1 session key; The addressee specified disassembles digital envelope, to file decryption; Encrypt file uses sender namely to encrypt the SM2 cryptographic algorithm digital signature of people.
CN201410588159.XA 2014-10-29 2014-10-29 ChinaNet information safety protection system and protection method Pending CN104331655A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410588159.XA CN104331655A (en) 2014-10-29 2014-10-29 ChinaNet information safety protection system and protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410588159.XA CN104331655A (en) 2014-10-29 2014-10-29 ChinaNet information safety protection system and protection method

Publications (1)

Publication Number Publication Date
CN104331655A true CN104331655A (en) 2015-02-04

Family

ID=52406377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410588159.XA Pending CN104331655A (en) 2014-10-29 2014-10-29 ChinaNet information safety protection system and protection method

Country Status (1)

Country Link
CN (1) CN104331655A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135547A (en) * 2019-04-02 2019-08-16 广州中大微电子有限公司 A kind of fingerprint IC card for supporting eID identification

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172406A1 (en) * 2007-12-28 2009-07-02 Diansong Cao Method and system for protecting patient data
CN203102296U (en) * 2013-02-01 2013-07-31 山西中网信息产业有限公司 Information safety protection system
CN104021329A (en) * 2014-05-19 2014-09-03 深圳市元征科技股份有限公司 USB storage device with fingerprint identification function and identification method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172406A1 (en) * 2007-12-28 2009-07-02 Diansong Cao Method and system for protecting patient data
CN203102296U (en) * 2013-02-01 2013-07-31 山西中网信息产业有限公司 Information safety protection system
CN104021329A (en) * 2014-05-19 2014-09-03 深圳市元征科技股份有限公司 USB storage device with fingerprint identification function and identification method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135547A (en) * 2019-04-02 2019-08-16 广州中大微电子有限公司 A kind of fingerprint IC card for supporting eID identification

Similar Documents

Publication Publication Date Title
CN105960775B (en) Method and apparatus for migrating keys
US9189612B2 (en) Biometric verification with improved privacy and network performance in client-server networks
CN104200363B (en) A kind of method of payment of the electronic purse system based on encrypting fingerprint
WO2007112023A2 (en) Secure biometric processing system and method of use
CN105429761A (en) Key generation method and device
KR20210091155A (en) Biocrypt Digital Wallet
CN107683582A (en) Certification instruction pen equipment
CN103606047A (en) Password management system
US11693944B2 (en) Visual image authentication
CN101458750A (en) Data safety processing method and data safety storage apparatus
CN105117658A (en) Password security management method and equipment based on fingerprint authentication
CN201518127U (en) Encrypted mobile memory based on password authentication
CN105337742A (en) LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information
CN108073820A (en) Security processing, device and the mobile terminal of data
CN107066868A (en) A kind of data guard method and device of identity-based certification
CN202372990U (en) USB (Universal Serial Bus) key with fingerprint identifying function
CN112425116A (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
CN108322440A (en) It is a kind of to utilize safety equipment Card Reader login method and Security Login System
WO2017137481A1 (en) A removable security device and a method to prevent unauthorized exploitation and control access to files
AU2020210529A1 (en) Offline interception-free interaction with a cryptocurrency network using a network-disabled device
CN104331655A (en) ChinaNet information safety protection system and protection method
CN105227562B (en) The key business data transmission mediation device and its application method of identity-based verifying
CN105357005A (en) Electric power trusted computing cryptographic module for PCI/PCI-E interface
CN101639881A (en) Data transmission line
CN203786724U (en) Encrypted mobile storage device with high safety

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150204